| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Competing in CTF events can be difficult for some and winning them can even be strenuous. Behind the curtains creating a fun and resilient CTF to be played with in the first place is the near impossible challenge. The Honeyn3t Ireland team have spent the last better part of a year working on providing CTFs. This talk will chronicle how to run a successful CTF by highlighting the common mistakes made and by utilising existing OWASP projects

| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | The PCI-DSS and PA DSS standards are well known to security professionals and auditors, but how are these interpreted by software development teams? Usually is not clear whether all requirements are necessary and most importantly, how these should be implemented. This talk aims to help developers understanding the key points of these standards in a simple and fast approach and be able to implement them during the software development cycle

| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | The PCI-DSS and PA DSS standards are well known to security professionals and auditors, but how are these interpreted by software development teams? Usually is not clear whether all requirements are necessary and most importantly, how these should be implemented. This talk aims to help developers understanding the key points of these standards in a simple and fast approach and be able to implement them during the software development cycle

| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | The web is evolving day by day: interactive and effective web applications are progressively adopted in the Internet thanks to innovative solutions implemented in modern web browsers. These latters offer sensational capabilities for running complex applications since client-side scripting languages ensure flexibility and varied functionalities. As the complexity of the web moves on the client-side, web security needs to shift its focus on this part too; indeed, enriching browsers capabilities may pave the way to new possible threats and attack surfaces. In this talk, we analyse how the adoption of HTML5 impacted the Web in terms of security and we dissect how attackers might exploit such

+

| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | The web is evolving day by day: interactive and effective web applications are progressively adopted in the Internet thanks to innovative solutions implemented in modern web browsers. These latters offer sensational capabilities for running complex applications since client-side scripting languages ensure flexibility and varied functionalities. As the complexity of the web moves on the client-side, web security needs to shift its focus on this part too; indeed, enriching browsers capabilities may pave the way to new possible threats and attack surfaces. In this talk, we analyse how the adoption of HTML5 impacted the Web in terms of security and we dissect how attackers might exploit such introduction in order to realize successful attacks. By touching novel XSS attack vectors, clickjacking techniques, CSRF exploits, and cross domain communication approaches, we present interesting and real attack methodologies, and at the same we report robust defenses, such as CSP, against these today's threats by trying to understand the hindrances which could slaken their adoption. Eventually, practical examples are provided for each discussion point and the behaviors of the parties, which are involved in the attack, are considered in order to understand how attackers move, how victims are cheated and how developers should act.

−

introduction in order to realize successful attacks. By touching novel XSS attack vectors, clickjacking techniques, CSRF exploits, and cross domain communication approaches, we present interesting and real attack methodologies, and at the same we report robust defenses, such as CSP, against these today's threats by trying to understand the hindrances which could slaken their adoption.

+

−

Eventually, practical examples are provided for each discussion point and the behaviors of the parties, which are involved in the attack, are considered in order to understand how attackers move, how victims are cheated and how developers should act.

| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | The Android devices, as well as the Android applications, are growing exponentially and as a result increase the personal data that users retain on such devices. Android has made the model "permits" a flag the security of your operating system. As, however, this model turns out to be really sure? An application that can not require any permission to access sensitive data and send them to a remote handler? We will focus on the safety management of Android and how this model can be bypassed in part independently from version in use. Will then be shown an example of the application, seemingly harmless, however, able to steal the data recorded on the a device updated to the latest version of Android currently available.

| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | The Android devices, as well as the Android applications, are growing exponentially and as a result increase the personal data that users retain on such devices. Android has made the model "permits" a flag the security of your operating system. As, however, this model turns out to be really sure? An application that can not require any permission to access sensitive data and send them to a remote handler? We will focus on the safety management of Android and how this model can be bypassed in part independently from version in use. Will then be shown an example of the application, seemingly harmless, however, able to steal the data recorded on the a device updated to the latest version of Android currently available.

| style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Competing in CTF events can be difficult for some and winning them can even be strenuous. Behind the curtains creating a fun and resilient CTF to be played with in the first place is the near impossible challenge. The Honeyn3t Ireland team have spent the last better part of a year working on providing CTFs. This talk will chronicle how to run a successful CTF by highlighting the common mistakes made and by utilising existing OWASP projects

Revision as of 10:42, 8 June 2013

OWASP Europe Tour - Rome 2013

Thursday 27th June (Conference) Friday 28th June (Training)

DESCRIPTION

OWASP Europe TOUR, is an event across the European region that promotes awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.

Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document & Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.

This event aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.

OWASP MEMBERSHIP

During the OWASP Europe Tour you could become a member and support our mission.

Competing in CTF events can be difficult for some and winning them can even be strenuous. Behind the curtains creating a fun and resilient CTF to be played with in the first place is the near impossible challenge. The Honeyn3t Ireland team have spent the last better part of a year working on providing CTFs. This talk will chronicle how to run a successful CTF by highlighting the common mistakes made and by utilising existing OWASP projects

10:30 am(30 mins)

PCI for Developers

Fabio Cerullo, OWASP Dublin Chapter, CEO & Founder of Cycubix

The PCI-DSS and PA DSS standards are well known to security professionals and auditors, but how are these interpreted by software development teams? Usually is not clear whether all requirements are necessary and most importantly, how these should be implemented. This talk aims to help developers understanding the key points of these standards in a simple and fast approach and be able to implement them during the software development cycle

11:00AM (30 mins)

Scripting Application Security

Dinis Cruz, OWASP Evangelist, AppSec Guru, OWASP OWASP O2 leader

11:30 am(30 mins)

Client-Side Security in the modern Web

Mauro Gentile

The web is evolving day by day: interactive and effective web applications are progressively adopted in the Internet thanks to innovative solutions implemented in modern web browsers. These latters offer sensational capabilities for running complex applications since client-side scripting languages ensure flexibility and varied functionalities. As the complexity of the web moves on the client-side, web security needs to shift its focus on this part too; indeed, enriching browsers capabilities may pave the way to new possible threats and attack surfaces. In this talk, we analyse how the adoption of HTML5 impacted the Web in terms of security and we dissect how attackers might exploit such introduction in order to realize successful attacks. By touching novel XSS attack vectors, clickjacking techniques, CSRF exploits, and cross domain communication approaches, we present interesting and real attack methodologies, and at the same we report robust defenses, such as CSP, against these today's threats by trying to understand the hindrances which could slaken their adoption. Eventually, practical examples are provided for each discussion point and the behaviors of the parties, which are involved in the attack, are considered in order to understand how attackers move, how victims are cheated and how developers should act.

12:00 am(30 mins)

Android Apps permissions model (in)security

Davide Danelon

The Android devices, as well as the Android applications, are growing exponentially and as a result increase the personal data that users retain on such devices. Android has made the model "permits" a flag the security of your operating system. As, however, this model turns out to be really sure? An application that can not require any permission to access sensitive data and send them to a remote handler? We will focus on the safety management of Android and how this model can be bypassed in part independently from version in use. Will then be shown an example of the application, seemingly harmless, however, able to steal the data recorded on the a device updated to the latest version of Android currently available.